Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24-02-2022 23:18
Static task
static1
Behavioral task
behavioral1
Sample
7.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
7.exe
-
Size
547KB
-
MD5
91fa6215582b42f5cca599ba02bb737e
-
SHA1
77ea850c55d4d6dc51e1e25235a27d5f90d733e6
-
SHA256
7203a338d66ac5456e265ed210c09b7c28ec6bd50d46d48c8d38fe14846f834f
-
SHA512
e3e9bce29241fac8e9920acc39b4aec8b1dc70b1b954d634ee4776dc336c31657591a1d8bc735d5a827622ec3020172c0c54327ad150ba89baf85a5b9b656738
Score
10/10
Malware Config
Extracted
Family
buer
C2
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 3296 created 3292 3296 WerFault.exe 61 PID 3812 created 1576 3812 WerFault.exe 60 -
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/files/0x000300000001ed13-131.dat buer behavioral2/files/0x000300000001ed13-132.dat buer -
Executes dropped EXE 1 IoCs
pid Process 1576 plugin.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 240 3292 WerFault.exe 61 2268 1576 WerFault.exe 60 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1576 plugin.exe 1576 plugin.exe 2268 WerFault.exe 2268 WerFault.exe 240 WerFault.exe 240 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 240 WerFault.exe Token: SeBackupPrivilege 240 WerFault.exe Token: SeRestorePrivilege 2268 WerFault.exe Token: SeBackupPrivilege 2268 WerFault.exe Token: SeBackupPrivilege 2268 WerFault.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3516 wrote to memory of 1576 3516 7.exe 60 PID 3516 wrote to memory of 1576 3516 7.exe 60 PID 3516 wrote to memory of 1576 3516 7.exe 60 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 1576 wrote to memory of 3292 1576 plugin.exe 61 PID 3296 wrote to memory of 3292 3296 WerFault.exe 61 PID 3296 wrote to memory of 3292 3296 WerFault.exe 61 PID 3812 wrote to memory of 1576 3812 WerFault.exe 60 PID 3812 wrote to memory of 1576 3812 WerFault.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\7.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 2204⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 9483⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3292 -ip 32921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1576 -ip 15761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3812